IT Change Management Process Training
|
|
- Wesley Stewart
- 8 years ago
- Views:
Transcription
1 IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge of handling IT Changes. As such, this course aims to deliver informa9on that is easily understood and relevant to everyone. We invite your specific ques9ons or comments and encourage you to follow up directly with your manager.
2 Course Objec9ves This course explains the following: Value of Change Management to the Enterprise Key Defini9ons for Change Management Roles and Responsibili9es The Five Phases of the Change Management Process
3 Addi9onal Informa9on & Resources Throughout this course you will have access to the Change Management Process document. This document provides the detailed defini9ons, roles and responsibili9es, and process ac9vi9es that are performed during the Change Management Process. You can access this informa9on any 9me during the course by clicking the icon at the top right- hand of the course. Go ahead and try it now! Click here to Bookmark the Change Management Process in your browser.
4 A Case Study and the Value of Change Management to the Enterprise A request was made to upgrade an applica9on that supported the Opera9ng Rooms (ORs) of a major hospital. This Request for Change (RFC) required a hardware configura9on change in the ORs. The change was implemented and shortly awerwards, the Service Desk started receiving calls that Physicians were unable to access the applica9on. As a result, pending surgeries were delayed and surgeries in progress were compromised. Pa9ent safety was at risk! A post implementa9on review was conducted and it was determined that an RFC was submixed into the Change Management System that included all the required steps and tes9ng by the assignee; however, during implementa9on, the assignee neglected to follow the change plan which documented detailed steps on configuring hardware for older model computers in the ORs. This meant the change was implemented without following the en9re Change Management Process. Failure to follow the change plan caused risk to pa9ent care. The Change Management Process provides value to the Enterprise by enabling Changes to be made with minimum disrup9on to IT Services by ensuring change procedures are completed, reviewed and approved prior to implementa9on. Failure to Plan equals Plan for Failure
5 Key Defini9ons A Change is any modifica9on to the systems, infrastructure, or applica9ons that comprise the UCSF IT produc9on environment. RFC is an acronym for Request for change A request to implement a Change within the UCSF IT produc9on environment CMS is an acronym for Change Management System SoWware tool u9lized for the request, approval, tracking and details of changes. We use ServiceNow. CI is an acronym for Configura9on Item A component that needs to be managed under the Change Process in order to deliver an IT Service. CAB is an acronym for Change Advisory Board Meets regularly to help the change manager assess, priori9ze and schedule changes. PIR is an acronym for Post Implementa>on Review - A review that is conducted when an RFC implementa9on has not been successful. Change Management is an IT Service Management Process that aims to control the lifecycle of all changes. The primary objec9ve of the Change Management Process is to enable Changes to be made with minimum disrup9on to IT Services.
6 Change Management Policy To ensure the integrity, consistency and availability of UCSF IT Services, all changes to the UCSF IT produc9on environment will be tracked via a Request for Change (RFC). RFCs will be entered into and managed via ServiceNow to ensure Changes are centrally tracked, approved, reported upon, and enforced in a reliable and consistent manner. RFCs must be reviewed and approved by the Change Advisory Board (CAB) prior to execu9on to ensure a proposed Change does not compromise the stability of the produc9on environment. Zero tolerance for unauthorized changes!
7 Roles & Responsibili9es Within the Change Management process, specific roles and func9ons have been defined. Each role is responsible for comple9ng specific tasks within the process, however, all roles contribute to the success of the process. The Roles include: Change Assignee Peer Reviewer Group Manager Approver IT Director Approver Change Manager Change Advisory Board (CAB)
8 Change Assignee The Change Assignee is the individual making the changes in the environment. Responsibili9es of the Change Assignee include : Ensuring that a detailed and accurate change request has been submixed. Obtain technical Peer Review and other required approvals prior to the implementa9on 9me. Represent the change to the CAB Implement the change as planned, including valida9on, and closure of the change before the scheduled end date/9me. Par9cipate in Post Implementa9on Reviews (PIR).
9 Peer Reviewer The Peer Reviewer is the technical peer with similar knowledge of the environment where the Change will take place. Responsibili9es of the Peer Reviewer include : Review the RFC and ensure that the specific technical steps planned appear to be correct. Update the RFC, indica9ng that they have reviewed the technical steps of the Change. Represent the RFC during CAB, if the Assignee is unavailable. Back up the assignee during the actual implementa9on.
10 Group Manager Approver The Group Manager Approver is the manager who provides the first level of approval to a RFC, allowing it to go before the CAB for review. In most cases, this is the manager of the Change Assignee. If that is not possible, the Change Approver can be any IT manager or above. Responsibili9es of the Group Manager Approver include: Review all RFC submixed by staff members of their group Ensure all necessary communica9on, coordina9on, documenta9on and tes9ng has been completed properly on all RFC prior to approval Approve all RFC prior to them being submixed for review by the Change Advisory Board Represent the change during CAB if the Assignee and Peer Reviewer are unavailable. Par9cipate in Post Implementa9on Reviews (PIR).
11 IT Director Approver The IT Director Approver is the director who provides the second level of approval to a RFC that are high risk or requires to be expedited, allowing it to go before the CAB for review. In most cases, this is the director of the Change Assignee. If that is not possible, the IT Director Approver can be any IT director or above. Responsibili9es of the IT Director Approver include: Review all high risk or expedited RFCs submixed by staff members of their group Ensure all necessary communica9on, coordina9on, documenta9on and tes9ng has been completed properly on all high risk or expedited RFCs prior to approval Represent the change during CAB if the Assignee, Peer Reviewer, and Group Manager are unavailable. Approve all high risk or expedited RFCs prior to them being submixed for review by the Change Advisory Board
12 Change Manager The Change Manager is responsible for the overall facilita9on of the Change Management process. Responsibili9es of the Change Manager include: Coordinate and chair the regularly scheduled mee9ngs of the Change Advisory Board. Facilitate the resolu9on of any schedule conflicts that may arise. Maintain the policies and procedures necessary to carry necessary CM func9ons.
13 Change Advisory Board (CAB) The Change Advisory Board (CAB) is a group of individuals that represent various IT units and Client communi9es. This group is responsible for final review and approval/rejec9on of all comprehensive RFCs. The CAB meets at a regularly scheduled interval to review all pending RFCs. All Changes are reviewed by the CAB during its scheduled mee9ng. The CAB has the authority to do any of the following: Cancel or reject changes Approve RFC as presented Re- assess the risk level of a Change Re- assess the impact level of a Change Request addi9onal informa9on prior to approval
14 Change Types One of the key descriptors of a Change is its type. The Change type dictates which of the process steps must be completed. There are five Change types: rouene, emergency, comprehensive, expedited comprehensive, and latent. The process steps that are executed during a Change are adjusted based on type. The Change types are defined as follows: A RouEne change is a pre- approved change that is low in risk, rela9vely common, and follows a pre- defined procedure or work instruc9on. Rou9ne changes require ini9al review and approval by the CAB, but once approved, no longer require individual CAB approval. An Emergency change is one that must be done immediately. It is of such a high priority that it is auto- approved and scheduling is not required. The Emergency Change must be related to an ac9ve high or cri9cal priority incident. A Comprehensive change requires that all Change process steps be completed and reviewed for approval by the Change Advisory Board (CAB) prior to implementa9on. An Expedited Comprehensive change also requires that all Change process steps be completed, however, the change must be implemented in a 9me frame that does not allow them to go through the normal CAB approval cycle. Review and approval is done electronically. A Latent change that is logged awer implementa9on and did not follow the Change Management process. A PIR is required for latent changes and must be reviewed at CAB. A Latent change is also known as an unauthorized change!
15
16 Phase 1: Create RouEne Change 1. Select an approved rou9ne template to create a rou9ne RFC. Rou9ne templates require an ini9al CAB approval in order for the RFC to become Rou9ne 2. Select the responsible assignee to manage the Change The Change Assignee can schedule the change and go straight to the implementa9on phase, however, they need to ensure there are no conflicts with other RFCs scheduled before implemen9ng their rou9ne Change
17 Phase 1: Create Emergency Change 1. Create an RFC in ServiceNow and select responsible assignment group and assignee to manage the Change 2. Relate the Change to an ac9ve High or Cri9cal Incident. 3. Define the Change, Valida9on and Back- out plans: The Change Plan should include enough detail to explain what will be done. Valida9on plans should include steps to verify that the change fulfilled the technical and business objec9ves. It should also include steps to verify that exis9ng func9onality was not uninten9onally affected. Back- out plans should include the trigger that will be used by the assignee to transi9on from the implementa9on to the back- out procedure. 4. Document the impact to the business and assess the risk level. 5. Iden9fy Configura9on items (CIs) that will be added, removed, or modified by the change. 6. Define the change window, including implementa9on 9me, valida9on 9me and poten9al back- out 9me.
18 Phase 1: Create Comprehensive Change 1. Create an RFC in ServiceNow and select responsible assignment group and assignee to manage the Change 2. Define the Change, Valida9on and Back- out plans: The Change Plan should include enough detail to explain what will be done. Valida9on plans should include steps to verify that the change fulfilled the technical and business objec9ves. It should also include steps to verify that exis9ng func9onality was not uninten9onally affected. Back- out plans should include the trigger that will be used by the assignee to transi9on from the implementa9on to the back- out procedure. 3. Document the impact to the business and assess the risk level. 4. Iden9fy Configura9on items (CIs) that will be added, removed, or modified by the change. 5. Iden9fy the Peer Reviewer, Group Manager Approver and if required IT Director Approver. 6. Define the change window, including implementa9on 9me, valida9on 9me and poten9al back- out 9me. ServiceNow will automa9cally determine if the Change Type is Comprehensive or Expedited Comprehensive.
19 Phase 2: Conduct Reviews & Obtain Approval 1. Once an RFC has been completed and is ready to be submixed for approval, the Change Assignee must request a review of the RFC from a technical peer with similar knowledge of the Change. Peer Reviews are not required for Change Types: Rou9ne or Emergency 2. The technical peer reviews the RFC to ensure the technical steps planned appear to be correct. Once this is verified, the peer reviewer will update the RFC, indica9ng that they have reviewed the technical steps of the Change Keep in mind that the peer reviewer shares responsibility for the change!
20 Phase 2: Conduct Reviews & Obtain Approval 3. Once the RFC has been fully completed, submit the RFC for approval. The Change type dictates which approval steps must be completed. Change Type: Change Review and Approval: Rou9ne Pre- approved Emergency Auto- approved Comprehensive Peer Reviewer Group Manager Approval IT Director Approval (high risk only) CAB Expedited Comprehensive Peer Reviewer Group Manager Approval IT Director Approval* Expedited CAB (Campus only) * For Campus, IT Director Approval is only required for high risk Changes. * For Med Center, in addi9on to high risk changes, all expedited comprehensive Changes also require IT Director Approval.
21 Phase 2: Conduct Reviews & Obtain Approval 4. The Group Manager reviews the RFC for Approve or Reject the request. Approval will advance the RFC to the next level of approval. The Group Manager reviews the RFC for accuracy and to ensure the appropriate ac9ons have taken place, including but not limited to peer review of the proposed solu9on, plan for no9fica9on of the user community if required, and coordina9on of change with appropriate teams. 5. For high risk Changes, the IT Director reviews the RFC and Approve or Reject the request. Approval will advance the RFC to the next level of approval. IT Director approval is required for all Medical Center Expedited Comprehensive Changes and will advance to scheduled once approved. 6. The Change Advisory Board (CAB) will meet regularly for the purpose of reviewing all pending RFC. The CAB will either approve or reject the RFC during the course of the mee9ng. This is the final level of approval. All Change Assignee who have a RFC pending must axend the CAB mee9ng or send a representa9ve from their department who can properly represent and discuss the Change. Failure to do so may result in the automa9c Rejec9on of the RFC.
22 Phase 3: Schedule Change 1. Once the final approval is received, the Change Manager will change the status to scheduled. 2. If an update to the CI is required, a task will be created and must be completed before the change can be closed. 3. The Change Assignee no9fies the Service Desk and provide sufficient details to enable them to respond to calls from users who may be impacted by the change. 4. The Change Assignee or IT Service Desk sends required no9fica9ons to the user community.
23 Phase 4: Implement Change 1. Before ini9a9ng the actual change ac9vity, the Change assignee should change the status from Scheduled to WIP. The change cannot go to WIP before the scheduled start date/9me. 2. AWer changing the status to WIP, the assignee should enter the actual start date/9me. 3. The Change Assignee executes the Change Change Assignee should document ac9vi9es in the Work Log. Examples of the kind of informa9on that would be appropriate are: Reaching key milestones in the implementa9on Unexpected issues with the implementa9on The start/stop of valida9on as well as any unexpected results The reasons for backing out a change or closing the record as incomplete 4. The CI Support Group updates the CI if required and closes their task.
24 Phase 5: Conduct Post ImplementaEon Review & Close Change 1. Once the Change is completed, the Change Assignee no9fies the Service Desk and advise them of the success or failure as well as the current state of the impacted environment. 2. The Change Assignee should complete the RFC within 24 hours of the Change execu9on by selec9ng a Results Code for the Change. The result codes are: Successful: Implemented within the approved change window and all of the approved components for the change were implemented (no more, no less) Backed out: Started, but caused issues that required a reversal of the implementa9on Completed with issues: Implemented with issues that did not require a back out. Changes that are also completed outside the approved change window is considered completed with issues Incomplete: Par9ally implemented; not all of the components approved for the Change were implemented
25 Phase 5: Conduct Post ImplementaEon Review & Close Change 3. Any result code that is not Successful is considered an excep9on and will require the Group Manager Approver to conduct a Post Implementa9on Review (PIR) of the excep9on. The PIR should document: A descrip9on summarizing why the change was not successful A descrip9on of the business impact A descrip9on of effort that will be put in place to prevent a similar excep9on
San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL
San Jacinto College Banner & Enterprise Applica5on Review Task Force Report November 01, 2011 FINAL 1 Content Review goal and approach 3 Barriers to effec5ve use of Banner: Consultant observa5ons 10 Consultant
More informationCase Study. The SACM Journey at the Ontario Government
Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons
More informationUAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
More informationFirst Na)on Project Management Boot Camp
First Na)on Project Management Boot Camp Links to Learning - Ontario: Building a Sustainable Future Thunder Bay, Ontario What is a Project / Project Management? A project can be defined as a temporary
More informationConfigura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser
Configura)on Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser R. Gutleber 1 Goals Configura)on Management (CM) is the implementa)on and the execu)on of processes and procedures
More informationPROJECT PORTFOLIO SUITE
ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.
More informationExchange of experience from a SuccessFactors LMS Implementa9on
Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking
More informationSo#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
More informationProtec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
More informationA Publication of FastSpring. FastSpring. Advertiser. QuickStart Guide. Ten Steps to Get Up and Running Quickly in the FastSpring Affiliate Program
A Publication of FastSpring FastSpring Advertiser QuickStart Guide Ten Steps to Get Up and Running Quickly in the FastSpring Affiliate Program Welcome to the FastSpring Affiliate Program (powered by Impact
More informationLegacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
More informationHelp Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management
Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates
More informationProcess Owner: Change Manager Version: 1.0
BMC REMEDY 8.1 CHANGE MANAGEMENT USER GUIDE Process Owner: Change Manager Version: 1.0 DOCUMENT REVISION HISTORY Revision Description Date Approved by Number V1.0 Initial Release 6/25/2015 6/25/2015 Page
More informationDTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
More informationInforma.on Systems in Organiza.ons
Informa.on Systems in Organiza.ons MIS 2101 Week 7 / Chapter 7 Enhancing Business Processes Using Enterprise Informa.on Systems Photo: Objet Mathema+que by Man Ray, 1934 Chapter 7 Learning Objec.ves Core
More informationDisaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University
Disaster Recovery Planning and Implementa6on Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University Agenda Background for York s I.T. Disaster Recovery Planning
More informationMAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
More informationEffec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
More informationBreakout A: From Paper to EMR- Preparing for the Transi;on
Quality Counts! Breakout A: From Paper to EMR- Preparing for the Transi;on The Maine Regional Extension Center Forum Breakout Objec
More informationBank of America Security by Design. Derrick Barksdale Jason Gillam
Bank of America Security by Design Derrick Barksdale Jason Gillam Costs of Correcting Defects 2 Bank of America The Three P s Product Design and build security into our product People Cultivate a security
More informationIntroduction... 4. Purpose... 4 Scope... 4 Manitoba ehealth Change Management... 4 Icons... 4. RFC Procedures... 5
Remedy Change Management Version 3.0 Modified: 10/27/2015 Table of Contents Introduction... 4 Purpose... 4 Scope... 4 Manitoba ehealth Change Management... 4 Icons... 4 RFC Procedures... 5 Process Flow
More informationHIPAA Privacy Policy (Revised Feb. 4, 2015)
Valley Bone & Joint Clinic HIPAA Privacy Policy (Revised Feb. 4, 2015) 1. PURPOSE Valley Bone & Joint Clinic is commi2ed to protec6ng the rights of our pa6ents. In compliance with the Health Insurance
More informationAn Econocom Group company. Your partner in the transi4on towards Mobile IT
An Econocom Group company Your partner in the transi4on towards Mobile IT A few key figures 40 000 mobile terminals integrated annually 200 M of telecom expenses managed 50 000 mobility support 4ckets
More informationHow To Manage Change Management At Uni
Change Management Process VERSION 1.0 Version Date: 1 May 2006 Table of Revisions REVISION NUMBER DESCRIPTION OF CHANGES (PARAGRAPH AND OR SECTION NUMBERS FOR REVISION TRACKING) DATE OF CHANGE REVIEWED
More informationFounda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
More informationCSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records
electronic Medical Records and Genomics CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records Brian Shirts, MD, PhD University of
More informationFixed Scope Offering (FSO) for Oracle SRM
Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,
More informationHealthy Bengal Program - Plans and Goals for 2015
A Collabora)on to Promote Wellness at Idaho State University: The Healthy Bengal Program Carol Kirkpatrick, PhD, MPH, RDN, CLS Director, Wellness Center Division of Health Sciences Cara Liday, PharmD,
More informationKaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
More informationSyndromic Surveillance BioSense Onboarding in Arizona
Syndromic Surveillance BioSense Onboarding in Arizona Sara Imholte, Stanley Kotey, Manoj Shaw & Krystal Collier Electronic Disease Surveillance Program April 1, 2015 Introduc*ons Background Onboarding
More informationITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon
ITIL Version 3.0 (V.3) Service Transition Guidelines By Braun Tacon Executive Summary: This document is seven pages. Page one is informational/background only. What follows over the next six pages are
More informationICD- 10: Learning for a Successful Transi:on Part 2. Objec.ves for the Webinars. ICD- 10 Webinar Topics
ICD- 10: Learning for a Successful Transi:on Helene Fearon, PT, FAPTA Rhea Cohn, PT, DPT August 21, 2015 Practice Management Expertise for the Rehabilitation Professional DOCUMENTATION / CODING / BILLING
More informationPhone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
More informationGraduate Systems Engineering Programs: Report on Outcomes and Objec:ves
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, alice.squires@stevens.edu Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom
More informationDiscovering Computers Fundamentals, 2010 Edition. Living in a Digital World
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Objec&ves Overview Discuss the importance of project management, feasibility assessment, documenta8on, and data and informa8on
More informationThe Shi'ing Role of School Psychologists within a Mul7-7ered System of Support Framework. FASP Annual Conference October 29, 2015
The Shi'ing Role of School Psychologists within a Mul7-7ered System of Support Framework FASP Annual Conference October 29, 2015 Dr. Jayna Jenkins, Florida PS/RtI Project EARLY WARNING SYSTEMS AND THE
More informationENTERPRISE CHANGE MANAGEMENT PROCESS
University of California San Francisco ENTERPRISE CHANGE MANAGEMENT PROCESS VERSION 2.00, REV. 6/20/2013 Table of Contents 1 About this Process Document... 6 1.1 Intended Audience... 6 1.2 Assumptions...
More informationResearch in Simulation: Research and Grant Writing 101
Research in Simulation: Research and Grant Writing 101 Amar Patel, MS, NREMT-P, CFC Director, Center for Innovative Learning WakeMed Health & Hospitals Geoff Miller Director Eastern Virginia Medical School
More informationPoten&al Impact of FDA Regula&on of EMRs. October 27, 2010
Poten&al Impact of FDA Regula&on of EMRs October 27, 2010 Agenda The case for regula&ng Impact on manufacturers Impact on providers Recommenda&ons and best prac&ces 2 A Medical Device Is an instrument,
More informationOnline Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1
Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll
More informationDEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING
DEFINING COMPONENTS OF NATIONAL REDD+ FINANCIAL PLANNING WORKSHOP ON BUILDING MULTI- SOURCE REDD+ FINANCING STRATEGIES Antigua, Guatemala July 17 and 18, 2014 Objec'ves of REDD+ Financial Planning Financial
More informationReali9es of Being PCI Compliant
Reali9es of Being PCI Compliant Miguel (Mike) O. Villegas CISA, CISSP, GSEC, CEH, QSA, PA- QSA, ASV Vice President- K3DES LLC Professional Strategies S23 CRISC CGEIT CISM CISA Abstract PCI DSS compliance
More informationHUIT Change Management with ServiceNow. itsm@harvard.edu September 2013
HUIT Change Management with ServiceNow itsm@harvard.edu September 2013 Module 1: Basic Training - Change Requester/Implementer Change Management with ServiceNow Agenda Session Overview HUIT Change Management
More informationCouncil Monitoring & Assessment Program Development
Council Monitoring & Assessment Program Development Steve Giordano & Mark Monaco, Na9onal Oceanic & Atmospheric Administra9on Greg Steyer & Mike Lee, U.S. Geological Survey Alyssa Dausman & Jessica Henkel,
More informationProgram Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
More informationBusiness Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.
Business Analysis Standardization A Strategic Mandate John E. Parker CVO, Enfocus Solu7ons Inc. Agenda What is Business Analysis? Why Business Analysis is Important? Why Standardization of Business Analysis
More informationCS 5150 So(ware Engineering System Architecture: Introduc<on
Cornell University Compu1ng and Informa1on Science CS 5150 So(ware Engineering System Architecture: Introduc
More informationWhite Paper August 2006. BMC Best Practice Process Flows for ITIL Change Management
White Paper August 2006 BMC Best Practice Process Flows for ITIL Change Management Copyright 1991 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,
More informationAIS TECHNOLOGY SOLUTIONS GUIDE
AIS TECHNOLOGY SOLUTIONS GUIDE WHAT IS AIS AT TECH DATA? Advanced Infrastructure Solutions provide resellers with everything they need to keep their data centers up-to-date with the latest technology.
More informationHP Service Manager. Process Designer Content Pack 9.30.1. Processes and Best Practices Guide
HP Service Manager Process Designer Content Pack 9.30.1 Processes and Best Practices Guide Document Release Date: June, 2012 Software Release Date: June, 2012 1 Legal Notices Warranty The only warranties
More informationHow To Change A Test Order On A Lab
Laboratory- Clinical Communica1ons LCC Profile IHE Laboratory Domain College of American Pathologists Jim Harrison, Univ. of Virginia The Problem The tradi1onal order- result paradigm does not include
More informationBalancing Usability and Security for Medical Devices
Balancing Usability and Security for Medical Devices Ken Hoyme Adven&um Labs ken.hoyme@adven8umlabs.com Robert North, LLC bnorth@humancenteredstrategies.com March 17, 2014 3/17/2014 2014 Adven8um Labs
More informationNetwork Performance Tools
Network Performance Tools Jeff Boote Internet2/R&D June 1, 2008 NANOG 43/ Brooklyn, NY Overview BWCTL OWAMP NDT/NPAD BWCTL: What is it? A resource alloca=on and scheduling daemon for arbitra=on of iperf
More informationProject Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
More informationService Portfolio and Service Catalog Management. Foundation for making IT services transparent and linking IT outcomes to business outcomes
Service Portfolio and Service Catalog Management Foundation for making IT services transparent and linking IT outcomes to business outcomes Service What is a service? (Try now) A means to deliver value
More informationVoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
More informationFINANCIAL SERVICES CASE STUDY COLLECTION. Broker Profile, Multrees Investor Services Ltd & Spayne Lindsay & Co. LLP
FINANCIAL SERVICES CASE STUDY COLLECTION Broker Profile, Multrees Investor Services Ltd & Spayne Lindsay & Co. LLP The Workbooks product offered greater functionality... We also felt that we would receive
More informationDDC Sequencing and Redundancy
DDC Sequencing and Redundancy Presenter Sequencing Importance of sequencing Essen%al piece to designing and delivering a successful project Defines how disparate components interact to make up a system
More informationBusiness Analysis Center of Excellence The Cornerstone of Business Transformation
February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President
More informationAtlanta Care Transitions Initiative. Atlanta Regional Commission Area Agency on Aging
Atlanta Care Transitions Initiative Atlanta Regional Commission Area Agency on Aging Atlanta Regional Commission Atlanta Region Area Agency on Aging Regional Planning Commission 1 of 12 AAAs in Georgia
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationHIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC What cons?tutes PHI? HIPAA provides a list of 18 iden?fiers that cons?tute PHI. Any one of these iden?fiers
More informationThe Data Reservoir. 10 th September 2014. Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons
Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Solu4ons The Reservoir 10 th September 2014 A growing demand Business Teams want Open access to more informa4on More
More informationMission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology
Mission To provide higher technological educa5on with quality, preparing competent professionals, with sound founda5ons in science, technology and innova5on, commi
More informationCapitalize on your carbon management solu4on investment
Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 info@cdproject.net www.cdproject.net
More informationTop Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces
Top Practices in Health IT Compliance Data Breach & Leading Program Prac3ces Overview Introduc3on to ID Experts & Secure Digital Solu3ons Healthcare Data Breach Trends & Drivers Data Incident Management
More informationASTROPHYSICS DECADAL SURVEY 2020
ASTROPHYSICS DECADAL SURVEY 2020 Management Plan For Large Mission Concept Studies Rev B June 21, 2016 http://science.nasa.gov/astrophysics/2020-decadal-survey-planning/ This is a living document and will
More informationFTC Data Security Standard
FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls
More informationinforouter Workflows How the create a workflow defini6on in inforouter - Version 8.0.x
inforouter Workflows How the create a workflow defini6on in inforouter - Version 8.0.x Ac6ve Innova6ons, Inc. A Document Management Company Copyright 1998-2015 www.inforouter.com Crea6ng Workflows in inforouter
More informationManaged Services. An essen/al set of tools for today's businesses
Managed Services An essen/al set of tools for today's businesses Manage your enterprise better with a holis/c solu/on to all your IT worries only at Infolob What are Managed Services? By far the most cu/ng
More informationOverview of Informa.on Technology Procurement. www.its.ms.gov
Overview of Informa.on Technology Procurement www.its.ms.gov ITS Law: Responsibili7es and Authority www.sos.ms.gov: Educa7on & Publica7ons: MS Code of 1972 (Unannotated: via LexisNexis) ITS Statute: Title
More informationThe importance of supply chain
Guidelines for Improving Supply Chain Management at Bulgarian Enterprises Chief Assist. Prof. Miroslava Rakovska, Ph.D. Department of Business Logistics, UNWE tеl. (02) 9435248, 0888704178 e-mail: mirar@unwe.acad.bg
More informationEnterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory.
Enterprise Thousands of companies save 1me and money by using SIMMS to manage their inventory. SIMMS is a powerful inventory management system that enables you to gain fast and accurate control over your
More informationDeveloping Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed
More informationVA Pa&ent- Centered Community Care Provider Network Management Training Deck
VA Pa&ent- Centered Community Care Provider Network Management Training Deck Agenda Program Overview Provider Network Implementa&on Appointment Process Medical Documenta&on Care Coordina&on Claims Overview
More informationREDCap Longitudinal Studies & Surveys
REDCap Longitudinal Studies & Surveys ITHS Biomedical Informa2cs Core iths_redcap_admin@uw.edu Bas de Veer MS Research Consultant REDCap version: 6.0.1 Last updated October 22, 2014 1 Goals & Agenda Goals
More informationMangrove - SOA Modeling Framework Crea&on Review
Mangrove - SOA Modeling Framework Crea&on Review Wed, 17 Mar 2010 Copyright 2010 INRIA Made available under the Eclipse Public License v1.0 1 Outline Mangrove Overview Background Scope and Descrip&on Func&onal
More informationAbout the Board. Minnesota Board of Behavioral Health and Therapy 10/24/12. Minnesota Board of Behavioral Health and Therapy
Minnesota Board of Behavioral Health and Therapy Kari Rechtzigel, Executive Director Samantha Strehlo, LADC Licensing Coordinator Judi Gordon, LADC, RN, Board Chair Minnesota Board of Behavioral Health
More informationAchieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
More informationThe purpose of this document is to define the Change Management policies for use across UIT.
UNIVERSITY OF UTAH - IT OPERATIONS POLICY UIT CHANGE MANAGEMENT POLICY Chapter or Section: Information Technology ID SOP-CNFM.001 UIT Configuration Management Policy Rev Date Author Change 4.4 9/29/11
More informationPresent Levels of Academic Achievement and Functional Performance (PLAAFP) Training
Present Levels of Academic Achievement and Functional Performance (PLAAFP) Training Dillard Research Associates and Alaska Educa4on & Early Development January 22, 2015 1 Objectives of Training To understand
More informationChallenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS
Challenges of PM in Albania and a New Professional Perspec8ve Prepared by: Dritan Mezini, MBA, MPM B.S. CS Table of contents Presenter s brief introduc8on General Concepts What is a project? What is Project
More informationQuality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014
Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014 Karima Bourquard Director of Interoperability IHE- Europe Tes0ng and Cer0fica0on Objec0ves To design
More informationNANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS
NANOG DNS BoF DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS The Role Of An ISP In DNSSEC Valida;on ISPs act in two different DNSSEC roles, both signing and valida;ng
More informationHow To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
More informationNFPA 70E: What Contractors and Employers Need to Know
2014 NFPA Conference & Expo NFPA 70E: What Contractors and Employers Need to Know Presented by: Michael J. Johnston Execu
More information2015-16 ITS Strategic Plan Enabling an Unbounded University
2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave
More informationRemote Monitoring of Enterprise Systems
Remote Monitoring of Enterprise Systems A Step Towards Effec1ve Management of Cloud Based Services Johnson L Fisher, Director, IS Opera5ons May 28, 2015 Agenda Overview Current State Facility and Service
More informationDisrup've Innova'ons Track
Disrup've Innova'ons Track Product Disrup-ons: Medical Device Cybersecurity Presenter: Adam Brand, Associate Director, Pro-vi- V. 1.1 FACULTY DISCLOSURE The faculty reported the following financial relationships
More informationFinancial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners
Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners INTEGRATION: Merging internal and external excellence into
More informationChange Submitter: The person or business requesting or filing the Request For Change (RFC) notice.
ROLES, RESPONSIBILITIES, PROCEDUREs Change Submitter: The person or business requesting or filing the Request For Change (RFC) notice. IT Operations Change Manager: The steward of the Change Management
More informationSupport from the CMS Innova2on Center for Rural ACOs
Support from the CMS Innova2on Center for Rural ACOs Hoangmai Pham, MD, MPH Director, Seamless Care Models Group CMS Innova
More informationIntroduc)on to the IoT- A methodology
10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy
More informationUniversity of Utah WAN Firewall Presenta6on
University of Utah WAN Firewall Presenta6on Raising Awareness of our WAN Firewall Issues This document is for internal University of Utah use only. 4 Key Internet Firewall Ques6ons Who do we serve and
More informationHow To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook
How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply
More informationOpen Standards, the Cloud, and Grey Literature
Open Standards, the Cloud, and Grey Literature Panagio8s Stathopoulos, pstath@ekt.gr Na8onal Documenta8on Centre / Na8onal Hellenic Research Founda8on, hdp:// www.ekt.gr Athens, Greece Agenda The Na8onal
More informationWelcome! Accelera'ng Pa'ent- Centered Outcomes Research and Methodological Research. Andrea Heckert, PhD, MPH Program Officer, Science
Accelera'ng Pa'ent- Centered Outcomes Research and Methodological Research Emily Evans, PhD, MPH Program Officer, Science Andrea Heckert, PhD, MPH Program Officer, Science June 22, 2015 Welcome! Emily
More informationCFITS Industry Partners
UNIVERSITY OF SOUTH ALABAMA Les Barnett, Director 2015 CFITS Industry Partners INDUSTRY PARTNER PROGRAM CENTER FOR FORENSICS, INFORMATION TECHNOLOGY, AND SECURITY with the SCHOOL OF COMPUTING INDUSTRY
More informationHP Change Configuration and Release Management (CCRM) Solution
HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document
More informationIT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic
IT Governance in Organizations Experiencing Decentralization Jelena Zdravkovic Department of Computer & Systems Sciences (DSV), Stockholm University, Sweden Giannoulis About the Speaker Title: Associate
More information